Attacks on fixed-apparatus quantum-key-distribution schemes

Michel Boyer, Ran Gelles, and Tal Mor
Phys. Rev. A 90, 012329 – Published 21 July 2014

Abstract

We consider quantum-key-distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we present here, the “fixed-apparatus attack,” causes a potential risk to the usefulness of several recent implementations.

  • Figure
  • Figure
  • Received 26 November 2013
  • Revised 26 May 2014

DOI:https://doi.org/10.1103/PhysRevA.90.012329

©2014 American Physical Society

Authors & Affiliations

Michel Boyer1, Ran Gelles2, and Tal Mor3

  • 1Département IRO, Université de Montréal, Montréal, Québec H3C 3J7, Canada
  • 2Computer Science Department, University of California, Los Angeles, California 90095, USA
  • 3Department of Computer Science, Technion, Haifa 32000, Israel

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 90, Iss. 1 — July 2014

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×